Copyright © 2017 ALM Media Properties, LLC. All Rights Reserved.
You’re way ahead of the game, right? After all, your company has established policies and procedures mandating how to handle internal and third-party confidential data. You’ve kept track of all regulatory changes and updated your policies accordingly. You require encryption, strong passwords, and the use of firewalls. You conduct regular training sessions with your employees and — using the latest front-page stories of data breaches and their resultant business interruptions, lawsuits, fines, and reputational damage — you have sufficiently terrified your employees into compliance. But have you thought of everything? Not if your risk management plan doesn’t include vendor-supplied software and applications.